Unfortunately fx doesn't let me to export CA certificate. I can only
view server side certificate and export it. Also, marking the
exception as permanent doesn't make fx remember this setting and I
need to accept the certificate warning every time I go to a new SSL
site. I tried to import the certificate that fx shows after clicking
padlock icon in address bar and import it into a list of trusted CAs
but fx says that it's not a CA certificate. In fx I can only see that
this CA certificate is signed by the company itself, it contains its
name and address but I can't export it explicitly. And when I do
"openssl s_client -showcerts -connect HOSTNAME:443" it says "No client
certificate CA names sent". It seems to be harder than I thought. I
think that importing this CA certificate into a list of trusted CAs in
fx would make all warnings be gone.

On 6/17/13, Cristian Thiago Moecke <cont...@cristiantm.com.br> wrote:
> Ok, we have too much "maybe"s on an very open discussion that depends on so
> many variables... My intention is not to enter on a long discussion on
> security policies, I dont think the author of the first email is the
> network manager or the one that will deal with changing security policies,
> he only wants to get rid of some warnings, and therefore I would recommend
> him to keep with the most safe option, that is: only trust the CA for what
> you know it is made for, that is, trusting that specific site. You can do
> that by adding a permanent exception.
>
> But ok, I also would recomend that you talk with the network admins to
> clarify on how much trust should be put on the CA, how they want to deal
> with trust in the internal network, and so on. Maybe they will want to
> discuss it with us.
>
> But for our friend, the user, I would still recommend not messing with
> trust anchors more than needed. Let someone that knows what is going on
> there decide what to do.
>
>
>
> On Mon, Jun 17, 2013 at 1:43 PM, Salz, Rich <rs...@akamai.com> wrote:
>
>> **Ø  **because from a workstation people may access external websites
>> too. Like banks****
>>
>> ** **
>>
>> And perhaps they shouldn’t.  Have you seen the size of the built-in
>> browser CA trust lists recently?****
>>
>> ** **
>>
>> And really, which is more likely: an in-house CA leads you astray, or you
>> bring some external malware from the Internet into the company?****
>>
>> ** **
>>
>>                 /r$****
>>
>> --  ****
>>
>> Principal Security Engineer****
>>
>> Akamai Technology****
>>
>> Cambridge, MA****
>>
>
>
>
> --
> --
> Cristian Thiago Moecke
>
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to